HomeSecurity ArchitectureTrained commandos deployed to combat cybercrime in the state

Trained commandos deployed to combat cybercrime in the state

Published on

spot_img

In a bid to tackle the increasing cybercrime rate in Himachal Pradesh, the police department is all set to deploy a group of newly trained cyber commandos across the state. These cyber commandos have been equipped with cutting-edge skills and techniques after undergoing a rigorous training program at some of the top institutes in the country, as part of the cyber commando training initiative jointly organized by the Union Ministry of Home Affairs (MHA) and the Indian Cyber Crime Coordination Centre (I4C).

Following the completion of a six-month cyber commando training program at Rashtriya Raksha University (RRU) in Gandhinagar, Gujarat, four cyber commandos, including two female officers, have returned to Himachal Pradesh. The team consists of two women personnel, Manu and Madhu Sharma, and two male officers, Akash Thakur and Ram Sharma, who are now ready to combat cybercrimes using their enhanced expertise.

Deputy Inspector General (DIG) of State CID Cybercrime Mohit Chawla highlighted the crucial role these cyber commandos will play in preventing and investigating cyber offenses, in addition to engaging in ethical hacking and safeguarding sensitive data. He revealed that an initial group of 10 cyber commandos is expected to report to duty in Shimla soon, with plans for a future deployment of 29 more officers across the state.

It was further disclosed by the DIG that a total of 29 personnel from the Himachal Pradesh Police successfully passed the cyber commando test, a stringent examination conducted to filter out eligible candidates for the specialized training program. This year, a whopping 3,093 police personnel from various departments within the state participated in the national-level exam organized by the Ministry of Home Affairs.

The cyber commando training program stands as a strategic initiative launched by the Central government to counter cyber threats and reinforce national security measures. Through this comprehensive program, law enforcement officers are equipped with the necessary skills and knowledge to effectively combat a wide array of cybercrimes that pose a threat to the country’s digital infrastructure and cybersecurity.

The deployment of these trained cyber commandos marks a significant step towards fortifying the state’s defense against cyber threats and ensuring the safety of its digital environment. With their specialized expertise and advanced training, these cyber warriors are poised to make a substantial impact in the ongoing battle against cybercrimes, thereby safeguarding the interests of the citizens and upholding the integrity of the state’s digital landscape.

Source link

Latest articles

Extension of US Cybersecurity Information Sharing Bill

The Cybersecurity Information Sharing Extension Act, introduced by U.S. senators Gary Peters and Mike...

AI Now: The Use of AI by Telecom Companies in India to Combat Cyber Frauds – Times Now

Telecom companies in India are increasingly turning to artificial intelligence (AI) to combat cyber...

Attackers have been exploiting SonicWall SMA appliances since January 2025, according to securityaffairs.com

Threat actors have been actively exploiting a critical remote code execution vulnerability in SonicWall...

What’s in Store for the CVE Program Post-Mitre Management?

The Common Vulnerabilities and Exposures (CVE) Program, managed by Mitre, narrowly avoided a funding...

More like this

Extension of US Cybersecurity Information Sharing Bill

The Cybersecurity Information Sharing Extension Act, introduced by U.S. senators Gary Peters and Mike...

AI Now: The Use of AI by Telecom Companies in India to Combat Cyber Frauds – Times Now

Telecom companies in India are increasingly turning to artificial intelligence (AI) to combat cyber...

Attackers have been exploiting SonicWall SMA appliances since January 2025, according to securityaffairs.com

Threat actors have been actively exploiting a critical remote code execution vulnerability in SonicWall...